Summary of o365

o365 talks about

Summary of o365

@Microsoft365Pro @MicrosoftTeams @deltanr1 @vesanopanen @lauriepottmeyer Hi @Microsoft365Pro, thanks for sharing this! "I'm excited". Tested the new #SensitivityLabels in DEV. Loving😍this feature to assign labels to O365 Groups, especially in #MicrosoftTeams. Decide on "Private/Public", "External user access", "Unmanaged devices" - great!

test Twitter Media - @Microsoft365Pro @MicrosoftTeams @deltanr1 @vesanopanen @lauriepottmeyer Hi @Microsoft365Pro, thanks for sharing this! "I'm excited". Tested the new #SensitivityLabels in DEV. 
Loving😍this feature to assign labels to O365 Groups, especially in #MicrosoftTeams.
Decide on "Private/Public", "External user access", "Unmanaged devices" - great! https://t.co/FVfcbLzmgA
test Twitter Media - @Microsoft365Pro @MicrosoftTeams @deltanr1 @vesanopanen @lauriepottmeyer Hi @Microsoft365Pro, thanks for sharing this! "I'm excited". Tested the new #SensitivityLabels in DEV. 
Loving😍this feature to assign labels to O365 Groups, especially in #MicrosoftTeams.
Decide on "Private/Public", "External user access", "Unmanaged devices" - great! https://t.co/FVfcbLzmgA

That is – registry override works, home page still works, but the O365 Outlook client didn’t technically have the vuln (according to MS patch release). And peeps on O365 ignored GPO recommendations from the blog. All testing for blog was on O365 Click-to-Run. CC: @_staaldraad

Came up on our latest #StateOfTheHack episode – anyone know the answer? If an attacker sets registry keys as listed in fireeye.com/blog/threat-re… on Outlook Click-to-Run (O365), home page still works. But people are missing that in the blog since it’s *possibly not* CVE-2017-11774. twitter.com/prncpl1nf0s3c/…

📂 PST files are rarely backed up, may cause compliance issues, prone to corruption, make e-discovery more difficult, and are overall more problematic! ⚠️ Find out more info on why you should migrate to #O365 here: hubs.ly/H0m9kzj0

@BeatificCapita1 Zoom would be a great addition to O365

@skpodila @gadi_fe @Outlook @SparkMailApp O365 on Mac went through phenomenal uplift in the last 2-3 years. I’m slowly ditching gdocs.

@instagram Your email from "Suspicious Login Attempt" for the code doesn't go to O365 or even a gmail email. I have two accounts one email for each and only the SMS texting works, but no email is sent from your end with the code. I checked all folders and O365 support confirms

@instagram @instagram Your email from "Suspicious Login Attempt" for the code doesn't go to O365 or even a gmail email. I have two accounts one email for each and only the SMS texting works, but no email is sent from your end with the code. I checked all folders and O365 support confirms

'In the Involve stage, we want to engage employees at all levels of #O365 adoption.' @mjinspire and @MADMike_365 discuss how to involve your team during an adoption plan: hubs.ly/H0m4pgf0